State employee on administrative leave pending a full investigation
Story by kcra.com
Updated: 06-28-2011 1:14 pm
SACRAMENTO, Calif.
--
Personal information of about 9,000 current and former state employees was improperly copied and removed from state offices by a state employee, according to the California Department of Public Health.
The employee is on administrative leave pending a full investigation.
The security breach involved individuals’ names, birth dates and addresses from documents. The department's investigation found that the copied information includes workers’ compensation files that were copied onto a private hard drive.
A state security detection system alerted officials of suspicious activity in early April, according to a news release. The department has implemented more safeguard to protect information.
Copyright 2011 by KCRA.com. All rights reserved.
This material may not be published, broadcast, rewritten or
redistributed.
Ariz. police confirm second hack on officers' email
ADPS now being targeted by a group calling itself 'AntiSec'
BY BOB CHRISTIE
Associated Press
Updated: 06-29-2011 3:34 pm
PHOENIX
--
A second computer hacking attack in as many weeks against Arizona state police targeted personal email accounts of some of its officers, an official confirmed Wednesday.
The Arizona Department of Public Safety is reviewing the information released by a group calling itself AntiSec, agency spokesman Capt. Steve Harrison said. An attack last week by the computer hacking collective group Lulz Security targeted officers' DPS emails.
LulzSec said Saturday that it was disbanding, but the new postings appeared very similar and referenced the earlier attack.
AntiSec said in an online post that it was hitting Arizona police again and "dumping booty pirated from a dozen Arizona police officer's personal email accounts looking specifically for humiliating dirt."
"This leak has names, addresses, phone numbers, passwords, social security numbers, online dating account info, voicemails, chat logs, and seductive girlfriend pictures belonging to a dozen Arizona police officers. We found more internal police reports, cops forwarding racist chain emails, k9 drug unit cops who use percocets, and a convicted sex offender who was part of FOP Maricopa Lodge Five."
The group said it specifically targeted DPs spokesman Harrison, who they said "been bragging to the news about how they are upgrading their security and how they will catch the evil hackers who exposed them. Clearly not secure enough, because we owned his personal hotmail, facebook and match.com accounts and dumped all his personal details for the world to see."
Harrison said in an email to the Associated Press on Wednesday he would have more details later.
"It appears they hacked personal accounts, not the DPS system," Harrison said. "We are looking into this and reviewing the information released."
Last week's attack by LulzSec targeted the DPS email accounts of some officers. The group posted case files and the phone numbers and addresses of some officers. Many of the files LulzSec posted online were innocuous and included invitations to conferences and even some inspirational messages. Others focused on the activity and habits of drug cartels and threats to homeland security.
LulzSec has previously taken credit for hacking into Sony Corp. - where more than 100 million user accounts were compromised - and defacing the PBS website as well as a cyber-attacking the CIA website and the U.S Senate computer system.
Senator: We must fight to avoid 'cyber 9/11'
Lawmaker says country has failed to 'sufficiently address' cyber security issues
BY JOE DWINELL
The Boston Herald
Updated: 06-29-2011 4:16 pm
A 'cyber 9/11' cooked up by terrorist hackers could cripple the country if the nation continues to ignore the lessons painfully learned from the al-Qaeda attacks, the ranking Republican on the Senate Homeland Security Committee said yesterday.
U.S. Sen. Susan Collins of Maine told the Herald that a Boston mother's heroic fight to take the case of her son murdered on Sept. 11, 2001, to court could help the country avoid a virtual ambush.
'They are bringing out a level of detail (with their lawsuit) that is new and may help us identify further reforms that are needed,' said Collins, referring to the case of NHL hockey scout Mark Bavis.
The 31-year-old Bavis was murdered when United Airlines Flight 175 was slammed into the World Trade South Tower by al-Qaeda terrorists. It was one of two jets hijacked out of Logan International Airport on that day.
'Even this many years later, we're still hearing new information, new facts, new tidbits,' said Collins.
As the Herald reported last week, security screeners at Logan on 9/11 were clueless about al-Qaeda, didn't know how to spot Mace and struggled with English, according to court papers.
Collins warned miscommunication - singled out by the 9/11 Commission as a key failure - could once again lead to another terrorist attack.
'We know that terrorists are constantly probing for vulnerabilities in our security system,' she said. 'If I had to pick the number one vulnerability that we have failed to sufficiently address, it's in the cyber world.'
Computer stolen from S.C. hospital
Spartanburg Regional Medical Center says no patient information involved
BY LEE G. HEALY
Herald-Journal, Spartanburg, S.C.
Updated: 07-21-2011 3:20 pm
July 18--A computer was reported stolen from Spartanburg Regional Medical Center on Saturday. The incident is the third computer theft at the hospital since March.
According to a Spartanburg Public Safety Department incident report, a computer CPU was taken from a room in the hospital's emergency center some time after 10:30 a.m. Friday, when records show the computer was last online. Hospital officials said the computer contained no patient information.
A security officer reported the incident to police Saturday morning after he was made aware of the theft by a nurse. According to the report, a nurse on duty around the suspected time of the theft said a patient was discharged from the room at about 5:30 p.m. Friday and was carrying a duffel bag and a guitar case. The nurse said she first noticed the computer was not working when she was discharging the patient.
Chad Lawson, the hospital's public affairs director, said the computer did not store patient information, but was encrypted as an added security measure.
"We are committed to safeguarding patient information and recently began reviewing our information security protocols, as well as making enhancements in our information technology systems to improve safety of patient data," said SRMC Spokesman Chad Lawson.
Two other computers have been stolen from the hospital since March. The first was taken from a third-floor nurse's station March 5, and hospital officials said it did not contain any patient information. On March 28, a laptop that did contain personal and medical billing information was stolen from a hospital employee's car. Officials said the information on the computer was password-protected, and there was no indication the information had or would be used improperly.
0 comments:
Post a Comment